ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • Supply chain management balance shifts from efficiency to resilience under Covid

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.

  • SAP Cost Optimization on Cloud

    Sponsored by: Lemongrass

    Discover in this e-book how you can unlock cost savings in your mission-critical SAP landscape while maximizing operational resiliency.

  • Computer Weekly – 16 October 2018: Drilling into AI at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.

  • Atlassian Approach to ESM

    Sponsored by: Atlassian

    Technology is evolving at a frenetic pace, and organizations are required to move right along with them. Enterprise service management (ESM) can help organizations keep up with this change. But what is ESM and how can you utilize it in your organization? Download this whitepaper for tips and tricks, examples, and best practices.

  • Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.

  • Containers: Making security and business sense

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.

  • Computer Weekly – 9 July 2024: How data drives decisions at BAE Systems

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the chief data officer of one of the UK's biggest manufacturers, BAE Systems, about data strategy and diversity. Microsoft's claims over sovereign cloud for government IT are under scrutiny – we examine the issues. And our latest buyer's guide looks at trends in cloud databases. Read the issue now.

  • MicroScope – April 2022: Can life ever really be simple for partners?

    Sponsored by: MicroScope

    In this issue, discover whether simplifying programmes and interactions with partners is achievable, and what barriers stand in the way for vendors looking to make life easier. Also read about why reskilling in a post-pandemic world is key to boosting industry, and learn about what to expect from the manufacturing sphere over the next year

  • Computer Weekly – 12 November 2019: The importance of digital accessibility

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine what retailers need to do to make their digital channels accessible for disa-bled people. We look at the rise of alternative desktop productivity tools to Microsoft Office. And our new buyer's guide covers next-generation programming tools such as no-code/low-code development. Read the issue now.

  • The Evolution of AI in Cybersecurity: Breaking the Cycle of Reactionary Cybersecurity

    Sponsored by: Deep Instinct

    While security teams strive to combat new threats as fast as they can, as long as their approach is reactionary, hackers will always have the upper hand. This white paper examines how the adoption of AI and ML presents an opportunity to overcome reactionary approaches and achieve proactive anti-malware security. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.